Lubna Nasir Eddeen

Lubna Nasir Eddeen
  • Master of Computer Science
  • Professor at University of Jordan

About

9
Publications
44,995
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
70
Citations
Introduction
Lubna Nasir Eddeen currently works at the Department of Computer Science, University of Jordan. Lubna does research in Human-computer Interaction and Computer Security and Reliability. Their most recent publication is 'JSEA 2015111914321220'.
Current institution
University of Jordan
Current position
  • Professor
Additional affiliations
September 2004 - present
University of Jordan
Position
  • Teacher

Publications

Publications (9)
Conference Paper
Full-text available
The agriculture sector in Jordan faces significant challenges related to water scarcity and resource management. In the arid climate of the Jordan Valley, and varying temperatures between summer and winter, efficient farming practices are essential for sustainable crop production. To address this, we propose a smart greenhouse system that utilizes...
Article
Full-text available
Identification of insect pests to the species level is very important in the field of plant protection. The species name is a filing and retrieval system which enables us to store and/or retrieve all data for a species such as host plants, life cycle, damage, or pesticide resistance. However, identification of insects to the species level requires...
Article
Full-text available
Despite of the advantages of Information and Communication Technology (ICT) which makes our lives easier, faster, and more connected, the development of ICT is pushing the countries in the direction of ICT applications. The higher education is one of the sectors that try to adopt one of ICT applications through E-learning and using (Moodle) as lear...
Article
Full-text available
The purpose of this study is to evaluate the effectiveness of blended learning on the academic achievement of students in the University of Jordan. To gain in depth understanding of the phenomena under investigation, survey method is employed to collect natural data. For the sake of respondent convince all the questions asked in this survey are dir...
Conference Paper
Full-text available
Abstract— Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algori...
Conference Paper
Full-text available
Abstract— Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algori...
Article
Full-text available
Many books and research papers have defined and referred to the term SWOT Analysis. SWOT Analysis can be defines as "strategic planning method used to evaluate the Strengths, Weaknesses, Opportunities, and Threats involved in a project or in a business venture". It's used to assess internal and external environmental factors which affect on the bus...
Article
Full-text available
many educational institutions have adopted ELearning system or are thinking to adopt it in their educational systems. As a nearly recent system, many do not know the exact meaning of E-Learning, or why should it be used? After using it, will the institution face any problems? And what are the best solutions for these problems? This paper aims to an...
Conference Paper
Full-text available
The number of people using the Internet is increasing rapidly since the Internet became an essential and interesting part of human being culture and life. Searching for an image is one of the most important features for internet use. The name and the title of an image is not always enough, sometimes we have the image or the shape we want to look fo...

Network

Cited By